Information Security Lecture 3

In this lecture (Download here) we have discussed about  SYMMETRIC encryption .Working of symmetric encryption .Basic terminologies used in symmetric encryption . plaintext – the original message ciphertext – the coded message  cipher – algorithm for transforming plaintext to ciphertext  key – info used in cipher known only to sender/receiver encipher (encrypt) – converting plaintext toRead More

Tagged

Information Security Lecture 2

In information security lecture 2 we talk about cryptography .What is cryptography ? What are concepts of cryptography ? How we take plain text and convert it to cipher text and then on receiving end enciphering is done. What are intruders and what possibly intruders can do if they access the encrypted message.We also discussRead More

Tagged

Past Present and Future Of Information Security (cryptography)

In this article we have summarized the review paper by Nicholas G. McDonald .Complete paper can be found here All through history, military correspondence has had the best impact on encryption and the progressions thereof. An intensive comprehension of cryptography and encryption will help individuals grow better approaches to secure important data as innovation turnsRead More

Tagged

Information Security Lecture 1

information security

This article introduces us to information security .The subject of Information Security focuses on how to secure the information in transit.Information security provides us the mechanisms , algorithms , traditional methods their vulnerabilities , new encryption methods and how to implement them. The first lecture provides overview of security , security attacks and security mechanisms.DetailRead More

Tagged